Garret Grajek, CEH, CISSP, CGEIT
Irvine, California, United States
31K followers
500+ connections
About
Garret Grajek is a certified security leader with almost 30 years of experience in…
Articles by Garret
Contributions
-
What IAM skills do you need to move your organization to the cloud?
The cloud adds flexibility and elasticity - but it also add permission problems - because of it's openness, especially around provisioning new accounts. Permission creep and orphan accounts are a serious identity problem in cloud management. Palo Alto states that 99% of user accounts are over privileged - 99%. This must be addressed through regular and repeated cloud access reviews. This is exactly what YouAttest provides with a trivially simple cloud-plugin for identity attestation for all your on-premise and cloud resources. https://youattest.com
Activity
-
Do you ever feel like LinkedIn has a lot of potential for your business / career, but it can be a bit stuffy and non-personal? If you think about…
Do you ever feel like LinkedIn has a lot of potential for your business / career, but it can be a bit stuffy and non-personal? If you think about…
Liked by Garret Grajek, CEH, CISSP, CGEIT
-
With the IAAPA Expo having ended over a week ago, I look back with pride at the contributions that I was able to make as IAAPA Historian. IAAPA…
With the IAAPA Expo having ended over a week ago, I look back with pride at the contributions that I was able to make as IAAPA Historian. IAAPA…
Liked by Garret Grajek, CEH, CISSP, CGEIT
-
The Strategic Value of Cybersecurity Outsourcing for SMBs
The Strategic Value of Cybersecurity Outsourcing for SMBs
Liked by Garret Grajek, CEH, CISSP, CGEIT
Licenses & Certifications
Patents
-
Identity-based certificate management
Issued US 8,707,031
Methods for managing digital certificates, including issuance, validation, and revocation are disclosed. Various embodiments involve querying a directory service with entries that correspond to a particular client identity and have attributes including certificate issuance limits and certificate validity time values. The validity time values are adjustable to revoke selectively the certificates based upon time intervals set forth in validity identifiers included therein.
Other inventors -
Facilitating secure online transactions
Issued US 8,700,901
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences with transmitting a token from the server. Thereafter, the method continues with establishing a secure data transfer link. A server certificate is transmitted during the establishment of the secure data transfer link. The method continues with transmitting a response packet to the server, which is validated thereby upon receipt. The…
A method and system for mutually authenticating an identity and a server is provided in accordance with an aspect of the present invention. The method commences with transmitting a token from the server. Thereafter, the method continues with establishing a secure data transfer link. A server certificate is transmitted during the establishment of the secure data transfer link. The method continues with transmitting a response packet to the server, which is validated thereby upon receipt. The system includes an authentication module that initiates the secure data transfer link and transmits the response packet, and a server authentication module that transmits the token and validates the response packet.
Other inventors -
Single sign on with multiple authentication factors
Issued US 8,613,067
The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary…
The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials.
Other inventors -
Security device provisioning
Issued US 8,510,816
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client computer system. A security token object provisioning request may be received from the client computer system. In response, an authentication request may be transmitted. The user is authenticated against a user identity based upon a set of received identity credentials provided by the user. The extraction of a unique token identifier from the…
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client computer system. A security token object provisioning request may be received from the client computer system. In response, an authentication request may be transmitted. The user is authenticated against a user identity based upon a set of received identity credentials provided by the user. The extraction of a unique token identifier from the security token object is initiated, and completed without intervention from the user. The unique token identifier received from the client computer system is associated with to the user identity in a data store. By providing the security token object, the user can gain access to the computing resource.
Other inventors -
Configuring A Valid Duration Period For A Digital Certificate
Issued US 8,468,340
A valid duration period for a digital certificate is established by a process that includes assigning numeric values to certificate term. The numeric value assigned to each certificate term is representative of the valid duration period. The method continues by identifying one certificate term, which may include requesting a user to select a certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a certificate…
A valid duration period for a digital certificate is established by a process that includes assigning numeric values to certificate term. The numeric value assigned to each certificate term is representative of the valid duration period. The method continues by identifying one certificate term, which may include requesting a user to select a certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a certificate request. The server is configured to convert the numeric value associated with the requested certificate term into a duration counter value. The method may also include a certificate server receiving from the server, the certificate request including the duration counter value. The method may conclude with transmitting the signed certificate request to a client device capable of generating the digital certificate with the requested certificate term.
Other inventorsSee patent -
Mobile multifactor single-sign-on authentication
Issued US US8769651
Features are disclosed for authentication of mobile device applications using a native, independent browser using a single-sign-on system. An authentication module within the mobile application can direct the mobile device's native browser to a URL to initiate authentication with an authentication appliance. The mobile browser can receive and store a browser-accessible token to indicate previous authentication performed by the user. The mobile application can receive from the application…
Features are disclosed for authentication of mobile device applications using a native, independent browser using a single-sign-on system. An authentication module within the mobile application can direct the mobile device's native browser to a URL to initiate authentication with an authentication appliance. The mobile browser can receive and store a browser-accessible token to indicate previous authentication performed by the user. The mobile application can receive from the application appliance and store a client application ID token that may be presented to network services for access. A second mobile device application may direct the same browser to the authentication appliance. The authentication appliance may inspect the persistent browser-accessible token and issue a second client application ID identity to the second application without collecting additional authentication information, or collecting additional authentication information that is different from the first authentication information.
Other inventorsSee patent -
System and Method for Facilitating Secure Online Transactions
Issued US 8,327,142
A method and system for mutually authenticating a client and a server is provided in accordance with an aspect of the present invention. The method commences with transmitting a token from the server to the client. Thereafter, the method continues with establishing a secure data transfer link between the server and the client. A server certificate is transmitted to the client during the establishment of the secure data transfer link. The method continues with transmitting a response packet to…
A method and system for mutually authenticating a client and a server is provided in accordance with an aspect of the present invention. The method commences with transmitting a token from the server to the client. Thereafter, the method continues with establishing a secure data transfer link between the server and the client. A server certificate is transmitted to the client during the establishment of the secure data transfer link. The method continues with transmitting a response packet to the server, which is validated thereby upon receipt. The system includes a client authentication module that initiates the secure data transfer link and transmits the response packet, and a server authentication module that transmits the token and validates the response packet.
Other inventorsSee patent -
System and method for configuring a valid duration period for a digital certificate
Issued US 8,301,877
A method and system for configuring a valid duration period for a digital certificate. The method includes assigning a positive numeric value for each certificate term. The positive numeric value assigned to each certificate term is representative of the valid duration period. The method continues by prompting a user of the client device to request one certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a…
A method and system for configuring a valid duration period for a digital certificate. The method includes assigning a positive numeric value for each certificate term. The positive numeric value assigned to each certificate term is representative of the valid duration period. The method continues by prompting a user of the client device to request one certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a certificate request. The server is configured to convert the positive numeric value associated with the requested certificate term into a duration counter. The method may also include a certificate server receiving from the server, the certificate request including the duration counter. The certificate server is configured to digitally sign the certificate request. The method may conclude with the client device generating the digital certificate having the valid duration period correspond to the positive numeric value associated with the requested certificate term.
Other inventors
Honors & Awards
-
Best Mobile Identity, Safeguard, and Security Solution 2014
Global Mobile Awards
-
Top 100 North America 2014
Red Herring
-
Best BYOD Solution 2012
UP-START Cloud Computing
-
Fastest Growing Company 2012
People's Choice Stevie Awards
-
Favorite New Product 2012
People's Choice Stevie Awards
-
Best Authentication Solution 2011
Tomorrow's Technology Today
-
Best Single Sign-on Solution 2011
Tomorrow's Technology Today
Languages
-
German
Elementary proficiency
Recommendations received
2 people have recommended Garret
Join now to viewMore activity by Garret
-
YouAttest in the News: YouAttest announces it’s industry unique (and now U.S. patent granted) Identity Trust Score (ITS). Key to rapid identification…
YouAttest in the News: YouAttest announces it’s industry unique (and now U.S. patent granted) Identity Trust Score (ITS). Key to rapid identification…
Shared by Garret Grajek, CEH, CISSP, CGEIT
-
Having a data breach can be costly and cause harm to the reputation of a business. New York State has fined insurance giants GEICO $9.75 million and…
Having a data breach can be costly and cause harm to the reputation of a business. New York State has fined insurance giants GEICO $9.75 million and…
Liked by Garret Grajek, CEH, CISSP, CGEIT
-
empowering your business with the essentials for a secure and compliant future. Let's protect what matters most. 📍 Visit www.hntc.io to learn more.…
empowering your business with the essentials for a secure and compliant future. Let's protect what matters most. 📍 Visit www.hntc.io to learn more.…
Liked by Garret Grajek, CEH, CISSP, CGEIT
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More